OpenBCM V1.07b12 (Linux)

Packet Radio Mailbox

IW8PGT

[Mendicino(CS)-Italy]

 Login: GUEST





  
G4APL  > PACKET   27.11.16 20:55l 41 Lines 1206 Bytes #999 (0) @ WW
BID : 25242_GB7CIP
Read: GUEST
Subj: TCP port 2323 and 23
Path: IW8PGT<F1OYP<ON0AR<GB7CIP
Sent: 161118/1028Z @:GB7CIP.#32.GBR.EURO #:25242 [Caterham Surrey GBR]
From: G4APL@GB7CIP.#32.GBR.EURO
To  : PACKET@WW


TCP port 2323 and 23

Hello All

For those of you that have the COMMON TCP port services open on your
PUBLIC ISP Facing router, to enable access to your back-end systems.

The following is offered as information for you to act on accordingly
reported on a support site.

Thanks to Brian N1URO for drawing this to our attention
 > Sent: 17 November 2016 17:54
 > Subject: tcp 2323
 >
 > It's been reported by the north american adminstrators group that a
 > botnet has been blasting the internet on port 2323 causing routers to
 > crash. You may want to block this in your configs.
 >

On Thu, 2016-11-17 at 17:59 +0000, Paul Lewis G4APL wrote:
 > Also crashing XRouter  access as  well
 > Pings and netrom processes running
 > Ax25 and IP connections are refused
 > picked up as part of my diagnostics investigation earlier this week.
 > Found this system had port 23 and 2323 opened to the 'Wild World'
 >
 > Thanks for the confirmation
 >
 > 73 de Paul G4APL

Also seeing lots of attacks/scans/probes to port TCP 23 and 2323 being
blocked here.
73 de Paul
--
g4apl@gb7cip.ampr.org g4apl@gb7cip.#32.gbr.euro
message generated with Thunderbird and LinFBB


Read previous mail | Read next mail


 23.12.2024 11:48:26lGo back Go up